EP1665001B1 - Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card - Google Patents

Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card Download PDF

Info

Publication number
EP1665001B1
EP1665001B1 EP05763311A EP05763311A EP1665001B1 EP 1665001 B1 EP1665001 B1 EP 1665001B1 EP 05763311 A EP05763311 A EP 05763311A EP 05763311 A EP05763311 A EP 05763311A EP 1665001 B1 EP1665001 B1 EP 1665001B1
Authority
EP
European Patent Office
Prior art keywords
value
card
ponder
fact
cryptographic token
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Not-in-force
Application number
EP05763311A
Other languages
German (de)
French (fr)
Other versions
EP1665001A2 (en
Inventor
Paolo Di Iorio
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Incard SA
Original Assignee
Incard SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Incard SA filed Critical Incard SA
Priority to EP05763311A priority Critical patent/EP1665001B1/en
Publication of EP1665001A2 publication Critical patent/EP1665001A2/en
Application granted granted Critical
Publication of EP1665001B1 publication Critical patent/EP1665001B1/en
Not-in-force legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • G06F21/755Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning

Abstract

The invention define a new protection mechanism against attacks to security enforcing operation performed by cryptographic token and smart card. It is based on an attack detector which signal to the main elaboration system a potential attack situation. The invention offer an easy solution to SIM cloning problems of telecom operators which use old and breakable cryptographic algorithms such as the COMP-128 and does not want to invest many in updating the network authentication systems with more resistant authentication cryptographic algorithms. This is requirement is typical of the telecom operator of the emerging market which use not the state of the art in technology.

Description

    FIELD OF APPLICATION
  • This invention relates to a method for detecting and reacting against possible attacks to security enforcing operation performed by a cryptographic token or IC card.
  • The invention further relates to a token or IC card structured for implementing the above method and including means for detecting and reacting against possible attacks to security enforcing operations and comprising a microcontroller with associated or embedded memory portions.
  • BACKGROUND OF THE INVENTION
  • As is well known in this specific technical field secure tokens are available as integrated circuit cards incorporating a security software and specifically designed to retain secret data and information. Secure tokens can also have programmable language, such as Java, enabling them to run applications.
  • Secure or cryptographic tokens or cards include a protected storage area and a non-protected storage area. The protected area can only be accessed using a pin code created at the secure token creation, but that can be changed by the user.
  • The cryptographic token is normally used to store a secret key and to calculate a cryptographic algorithm using such a secret key on some input data that are received from an outside source.
  • The result of the calculation is sent back to the outside source (external word) that uses such a calculation for completing an authentication procedure.
  • As may be clearly understood, the authentication procedure is a weakness of the security relating to cryptographic tokens or cards since a tampering attack may be performed just during this procedure to access the secret information stored in the token or card. The prior art already provides for anti-tampering methods for reacting against possible attacks to cryptographic token and smart card storing secret information such as the secret keys used by the token in the security operation, lots of techniques has been developed and patented.
  • The prior art techniques focus the attention on countermeasures against power analysis and electromagnetic analysis attacks trying to make harder an attack based on analysis of the power and/or the electromagnetic emission during the manipulation of sensible information.
  • Some of the countermeasures can be implemented either in the algorithm code or at hardware level and mainly try to obscure the sensible information observable from the power traces and from the electromagnetic emissions.
  • Typically this countermeasures consists in adding noise on the power absorbed by the card or introducing random delay in the code execution. The random delay reduce the correlation between different traces and make harder the attack.
  • Other countermeasures to counteract such attacks are based on the masking of the sensible information during the elaboration by means of random transformation.
  • However, these techniques are specifically designed for protecting the implementation of the algorithm but they do not give any protection to the logic on which the algorithm is founded. In other words, no matter how good and complex the algorithm may be, but it becomes weak with the time as the computation power available to attacker increases and the algorithm become well known and studied by the attackers.
  • Moreover, the countermeasures against power and electromagnetic analysis implemented in the algorithm code are often implementation dependent and cannot be applied to all cryptographic algorithm in the same manner.
  • Another countermeasure trying to reduce the risks of attacks to cryptographic token or Smart Card is known as authentication Counter.
  • An authentication counter tries to limit the number of security enforcing procedure that the system can perform in all the system life. It address both attacks oriented to break the cryptographic logical and mathematics and attacks mining the implementation.
  • However, this countermeasure is no more effective in many cases since the number of executions of security procedure to break the system is typically minor than the total number of execution in all the lifecycle of the system.
  • A further solution is disclosed in the US patent No. 4,879,645 relating to a data processing device with high security of stored programs.
  • This document teaches to detect an input command for the cryptographic token or card and to count the number of times this input command is executed; however, this document does not take in consideration the possibility to assign a ponder value to such an input command.
  • Other techniques to increase the security procedure are based on the use of session keys evaluated each time a cryptographic elaboration is required.
  • Even if this technique may be considered more efficient if compared to the previously cited prior art techniques, it is pretty complex to be implemented and this is due on the fact that the cryptographic token and the other primary circuit portions involved in the security operation store not only a common master key but also a common state should be used to elaborate the session keys that have to always be synchronized.
  • The technical problem of the present invention is that of providing an efficient method for detecting and reacting against possible attacks to security enforcing operation performed by a cryptographic token or a smart card having features allowing to be independent from the implementation and assuring protection to the logic on which the algorithm is founded, not only to its implementation.
  • Another aim of the present invention is that of protecting authentication procedures based on cryptographic operation in which the authentication response is performed outside the cryptographic token.
  • Still another aim of the present invention is that of enforcing security operation regarding cryptographic token meanwhile maintaining a certain reasonable level of complexity.
  • A further aim of the invention is that of providing a method capable to react against possible attacks guaranteeing security without considering a static threshold to the number of sensible operations in the lifecycle of the system. The method should preserve its safety even if the number of executions of security procedure to break the system is minor then a threshold depending on improvement of the techniques implemented by the attackers.
  • A further aim of the present invention is that of providing a method capable to detect a potential attack to security enforcing operation in a dynamic and implementation independent way.
  • SUMMARY OF THE INVENTION
  • The solution idea on which the invention is based is that of providing the token or card with an attack detector capable to issue a signal to the main elaboration system informing about a potential attack situation.
  • An first embodiment of this invention provides a method for including the following steps:
    • detecting an input command for the cryptographic token;
    • assigning a ponder value to such an input command;
    • updating a counter value;
    • comparing said counter value with a reference threshold;
    • providing a warning signal output according to the result of the comparing phase;
    • wherein said counter value changes dynamically depending on the sequence of execution of said input commands, the counter value being updated according to the ponder values associated to the executed input commands.
      Another embodiment of the invention provides for a token an IC card or an electronic embedded system structured to implement the inventive method and including means for detecting and reacting against possible attacks to security enforcing operations and comprising a microcontroller with associated or embedded memory portions, characterized in that said means include an attack detector comprising a ponder over for assigning a ponder value to an input command of the token or card, a counter connected to the output ponder over for storing a counter value, a threshold reference to define a comparison value and a comparator to compare said counter value with said threshold value and provide an output warning signal according to the result of the comparison.
      The features and advantages of the method and IC card according to the present invention will become apparent from the following description of an embodiment thereof, given by way of non-limiting example with reference to the accompanying drawings.
    BRIEF DESCRIPTION OF THE DRAWING
    • Figure 1 is a schematic and simplified view showing a cryptographic token or a smart card system equipped with an attack detector based on the method of the present invention;
    • Figure 2 is a more detailed and schematic view of a portion of the system of Figure 1;
    • Figure 3 is a flow chart showing the steps of the method according to the present invention.
    DETAILED DESCRIPTION
  • With reference to the drawings figure a cryptographic token or IC card system realized according to the present invention is globally and schematically shown with the numeral reference 1.
  • The IC card to be used for a plug-in insertion into a host electronic device, not shown being of a conventional type such as for instance a mobile telephone device.
  • The IC card 1 may have the format and the external shape of a common SIM card for mobile telephonic application. However, nothing prevents from having the card 1 structured according to a different shape or format required by a specific application.
  • The IC card 1 includes a microcontroller 2, that may be considered the main processing unit, and conventional memory portions which are strictly associated to the microcontroller 2.
  • For the purpose of the present invention the quality and composition of the memory portions associated to the microcontroller 2 is not relevant. However, in order to provide a complete description of the system we may be considered that the token or card 1 is an integrated or embedded system equipped with a first read-only memory portion, a second or extended non-volatile memory portion and at least a further memory portion.
  • The first memory portion is generally a ROM memory including programs, i.e. software applications, masked on the read-only memory and defining the functionalities of the card.
  • Said second and extended memory portion is a non volatile memory may be an electrically erasable memory portion of the EEPROM or Flash having a NOR structure and including subroutines, extended instructions and or customised data.
  • Said further memory portion may be structurally and functionally independent from both said first read only memory portion and said extended memory portion and may be a read/write memory such as a volatile RAM.
  • As an alternative, even said further memory portion may be a EEPROM or another non-volatile memory device.
  • Advantageously, according to the present invention, the token or card 1 includes an attack detector 3 that may be structured as an hardware circuit portion or a software algorithm stored in one of the above mentioned memory portions.
  • More particularly, the attack detector 3 is involved in the cryptographic operations of the token 1 and includes an interface 4 used to receive input commands (b) and an output interface 5 for providing output signals (c) as a response.
  • The attack detector 3 comprises the following macro components:
    • a Ponder Over 6 receiving said input commands and assigning a ponder value to each input command;
    • a Counter 7 connected to the output of ponder over 7 for incrementing or decrementing a stored counter value;
    • a Threshold Reference 8 defining a threshold value for a comparison phase;
    • a Comparator 9 for comparing the value stored in the counter 7 with the threshold value and providing an output signal rising up the output line if the counter is minor than the threshold.
  • More particularly the counter value doesn't relates to the execution of a specified input command but it is incremented or decremented every time that an input command is executed. In this way the reaching of the threshold reference 8 is determined by the sequence of execution of input commands; in other words the threshold reference is not strictly related to the number of times a specific input command is executed but it is determined by the contribution of all the input commands executed.The microcontroller 2, which normally process the input data and provide the output, receives the output of the comparator 9. As an alternative the Operating System of the token or card 1 receives and warning signal from a running attack detecting subroutine.
  • To fully understand the method of the present invention it worth while to note that the most common techniques of attack to cryptographic algorithms implemented on cryptographic token and smart card are based on the repetitive execution of the card reading algorithm in order to acquire information useful to the attacker.
  • Useful information could be for instance: cipher text, couple of plain/cipher text or physical greatnesses in dependence on the kind of attack.
  • The number of executions required to complete successfully an attack vary considerably with the algorithm, its implementation and the instrumentation or reader available to the attacker, but it is typically considerably large, over 10.000 executions.
  • The time between subsequent algorithm executions is also a very important factor in determining the overall complexity of an attack; in fact an attack can be conducted successfully only if it require a time judged reasonable by the attacker.
  • This is true both for the logical attacks such as known/chosen plain text attacks and adaptive chosen plaintext attacks and for the power analysis and electromagnetic analysis attacks.
  • Advantageously, the attack detector incorporated into the token or card 1 according to the present invention allows alerting the microcontroller 2 about a potential attack issuing a warning signal when the execution of the security procedures based on cryptographic algorithm are invoked too often with respect to the typical working scenario.
  • The method is performed according to the following steps:
    • detecting an input command for the cryptographic token;
    • assigning a ponder value to such an input command;
    • updating a counter value;
    • comparing said counter value with a reference threshold;
    providing a warning signal output according to the result of the comparing phase.In other words, the counter value changes dynamically depending on the sequence of execution of said input commands, the counter value being updated according to the ponder values associated to the executed input commands.
  • The system can in this way set up appropriate reactions such as:
    • slow down the execution of the cryptographic algorithm so to enlarge the time required for a successful attack, thus discouraging an attacker;
    • block the cryptographic algorithm under execution;
    • mute the card;
    • returning wrong results to confuse the attacker or other measures.
  • According to the inventive method, the Ponder Over 6 assign a ponder value to an input command; for instance, the ponder block 6 may be structured with a look up table including a ponder value for each different kind of input command.
  • Follows an example of the ponder over in the case of realization with a look up table. Let suppose that the card accepts three different APDU in input: APDU#1, ADPU#2, APDU#3. Among these APDU let suppose that the APDU#2 is relevant for security because for example trigger the execution of a cryptographic algorithm. Let also suppose that the APDU#2 is more frequent than the other APDUs. The look up table could be organized as in Table 1. The ponder value is retrieved by looking up into the Ponder Over look up table with respect to the input APDU.
  • The ponder values assignment strategy could be summarized in this way: ponder values have to be assigned considering the frequency of security relevant APDUs with respect to the frequency of the other APDUs in the case of normal working conditions. Ponder values have to produce a warning in the case the attack detector detects that the frequency of the security relevant APDUs with respect to the other APDU exceed the frequency in the case of normal working conditions. Ponder values for security relevant APDUs should have a positive value; ponder values for not security relevant APDUs should have a negative value. Moreover the ponder value should be inversely proportional to APDUs frequency: the more an APDU is issued frequently in the normal working condition the lower should be its ponder. Table 1 - Ponder Over Table
    APDU Ponder Value Note:
    APDU#1 -02 Not Security Relevant very frequent APDU
    APDU#
    2 10 Security Relevant APDU
    APDU#3 -04 Not Security Relevant but not very frequent APDU
  • Let consider the ponder over implemented by means of the look up table of Table 1. Let suppose that the sequence of APDUs in the normal working condition is the following: APDU#3, APDU#1, APDU#1, APDU#1, APDU#2; let also suppose that the counter have an initial value of 20 and the threshold level is set to 25. Table 2, Table 3 sketches the way of working of the ponder over. Table 2 - Normal working sequence; no warning is raised up by the attack detector
    Input APDU Ponder Value Counter Value
    (old + ponder = new value)
    Threshold Warning Status
    APDU#3 -4 20 - 5 = 16 25 No warn
    APDU#1 -2 16 - 2 = 14 25 No warn
    APDU#1 -2 14 - 2 = 12 25 No warn
    APDU#1 -2 12 - 2 = 10 25 No warn
    APDU#2 +10 10 + 10 = 20 25 No warn
    APDU#3 -4 20 - 4 = 16 25 No warn
    APDU#1 -2 16 - 2 = 14 25 No warn
    APDU#1 -2 14 - 2 = 12 25 No warn
    APDU#1 -2 12 - 2 = 10 25 No warn
    APDU#2 +10 10 + 10 = 20 25 No warn
    Table 3 - Abnormal working sequence; the attack detector raise up a warning
    Input APDU Ponder Value Counter Value
    (old + ponder = new value)
    Threshold Warning Status
    APDU#3 -4 20 - 4 = 16 25 No warn
    APDU#1 -2 16 - 2 = 14 25 No warn
    APDU#2 +10 14 + 10 = 24 25 No warn
    APDU#3 -4 24 - 4 = 20 25 No warn
    APDU#1 -2 20- 2 = 18 25 No warn
    APDU#2 +10 18 + 10 = 28 25 Warning attack detected
  • Figure 2 shows in a detailed and schematic view the counter value updating according to the method of the present invention. More particularly a generic "input command X", before being executed, is processed by the ponder over 6 that detects the ponder value associated to the input command X through a look up table like the one shown in table 5. If the ponder over 6 detects, for example, that the command to be executed is the input command "i", it increments the counter value adding, to its actual value, the ponder value "Pi", where i represent all the possible input commands.As an alternative, in case of software implementation, the pondering phase may be obtained by a cascade of test instructions of the "IF" kind in a specific subroutine, thus assigning a predetermined ponder value according to the result of an IF test.
  • It's important to note that the ponder values may even be varied after the processing of an input command. In other words, the ponder values in the look up table or the predetermined ponder values in said subroutine might be changed dynamically to increase the reaction force of the token or card 1 against a reiterated attack.
  • The Counter 9 is provided to increment or decrement the stored counter value. Moreover, the counter 9 may be incremented by a predetermined or variable amount of integer values just according to the assigned ponder values.
  • The Threshold Reference 8 define a threshold value for the comparison; this threshold value may even be updated after receipt of a first warning signal, so that a further or second attack attempt may be detected more quickly. Finally, the Comparator 9 compare the counter value with the threshold level and rises up the output line for instance if the counter is minor than the threshold.
  • A possible simplified version of the inventive structure or procedure would require a simple counter keeping and storing a predetermined value that should be decremented according to the output of the ponder block 6 or subroutine.
  • When such a counter should reach a "0" value, the warning signal would be automatically generated.
  • A skilled in the art should appreciate that this possible simplified embodiment is just an alternative manner to realize the previously disclosed embodiment, since the final "0" value of the simplified and decremental counter may be considered corresponding to the reference threshold value and a comparison is considered performed just when the counter has reached the "0" value or an end or reset value.
  • In this respect, at the very beginning the counter is initialized with a suitable starting value obtained for example by experimental results on the typical working scenario.
  • The counter 9 can store the counter value in a non volatile memory portion of the card so to keep it even if a power loss occur and avoiding easy workaround based on power loss.
  • The attack detector parse the input commands (APDUs in the case of Smart Card) sent by the external word to the cryptographic token before they are elaborated by the microcontroller.
  • In particular the block 6 named Ponder Over analyze the input command and assign it a ponder value to be used to update the counter value. This value can be positive or negative (for instance in the disclosed alternative embodiment) according to the ponder strategy designed in the ponder over block 6 and so can increment or decrement the value of the counter.
  • In particular negative value are assigned to all the security enforcing operation which invoke a cryptographic algorithm. AS already mentioned, the ponder over can be based on a combinatory logic and implemented for example by means of look up tables or can be based on a more complex sequential logic network or algorithm.
  • In the case of SIM card where the attack detector can be use to counteract the SIM cloning increasing the protection of the network authentication algorithm against attacks, a negative value, opportunely selected on the base of experimental results can be assigned to the APDU RUN_GSM_Algorithm used to authenticate the card.
  • Suitable positive values have to be assigned to all the other input APDUs.
  • The counter value is constantly compared with a threshold value set up by the microcontroller. The threshold level is defined on the base of practical issues and may be minor of the counter starting value.
  • When the counter value goes under the threshold value the system attack detector rise up a potential attack warning to the system that become aware of a potential attack and set up a reaction. The reaction could be delay the next cryptographic calculation operation so to enlarge the time to conduct successfully an attack, for instance recalling a delay subroutine.
  • Figure 3 shows a flow chart representing the step of the method according to the present invention; in particular with reference S1 is indicated the reading of the input command i and with S2 the assigning of the corresponding ponder value.
  • The counter value is updated in S3 adding the ponder value of the input command i to its actual value; the new counter value is compared in C 1 with the Threshold reference causing the block of the IC Card if the Threshold is reached, as indicated in S5. Otherwise, if the Threshold is not reached, the input command can be executed in S4.
  • An alternative response could be that of confusing the attacker with a wrong output value obtained for instance through a random number generator.
  • Another possible alternative could be that of blocking the token or even a more complex reaction strategy.
  • If compared to the prior art, the present invention has the remarkable advantage to protect both the implementation and the logic of the algorithm.
  • Moreover the method is independent from the implementation and can be applied to all the algorithm and security procedures.
  • The invention offer an easy solution to SIM cloning problems of telecom operators which use old and breakable cryptographic algorithms and does not want to invest many resources in updating the network authentication systems with more resistant authentication cryptographic algorithms.
  • Advantageously, the present invention is based on a method for detecting and reacting against possible attacks considering a ponder value associated to each input command and a counter value associated to the sequence of execution of said input command. In this way a possible reaction is raised according to the sequence of execution of said input commands, taking into consideration a ponder value with a high value for input commands needing a high degree of security and a low ponder value, eventually a negative value, for input commands considered not dangerous for the IC Card security.
  • This method is dynamic because a reaction is raised not depending on the number of times an input command is executed but depending on the entire set execution of input commands performed during the activation of the IC Card. In this way the method prevents to raise an undesired reaction due, for example, to acceptable user errors and, at the same time, provides for a right reaction when the performed set of input commands is suspicious.
  • The invention does not limit the total number invocation of the security procedure preventing the crash of the security system even in abnormal abuse of such procedure; it is not based on timing measures and then is applicable to all simple systems that does not have an internal, coherent and continuous working reference of time like smart card.
  • Finally it can be partially implemented at the hardware level.

Claims (15)

  1. A method for detecting and reacting against possible attacks to security enforcing operation performed by a cryptographic token or an IC card (1) including the following steps:
    - detecting (S1) an input command for said cryptographic token or IC card (1);
    - assigning (S2) a ponder value to said input command;
    - updating (S3) a counter value by adding or substracting said ponder value;
    - comparing (C1) said counter value with a reference threshold;
    - providing (S5) a warning signal output according to the result of said comparing step (C1);
    characterized by the fact that said counter value changes dynamically depending on the sequence of execution of said input commands, said counter value being updated according to the ponder value associated to the executed input commands.
  2. Method according to claim 1 characterized by the fact that said updating (S3) adds said ponder value to said counter value.
  3. Method according to claim 2 characterized by the fact that said ponder value is a positive value.
  4. Method according to claim 2 characterised by the fact that said ponder value is a negative value.
  5. A method according to claim 1 characterized by the fact that said warning signal is issued by a rise up of an, output line if said counter value is minor than said reference threshold.
  6. A method according to claim 1 characterized by the fact that said counter value is initialized with a suitable starting value obtained by experimental results on a typical working scenario of said cryptographic token or IC card (1).
  7. A method according to claim 1 characterized by the fact that the input commands sent to said cryptographic token or IC card (1) are detected before they are elaborated by a microcontroller of said cryptographic token or IC card (1).
  8. A method according to claim 1 characterized by the fact that said counter value is constantly compared with said reference threshold.
  9. A method according to claim 1 characterized by the fact that said reference threshold is an end or reset value of said counter value.
  10. A cryptographic token or IC card (1) including means for detecting and reacting against possible attacks to security enforcing operations and comprising a microcontroller (2) with associated or embedded memory portions, said means including an attack detector (3) comprising
    - a ponder over (6) for assigning a ponder value to an input command of the cryptographic token or IC Card (1);
    - a counter (7), connected to the output of said ponder over (6), for storing a counter value;
    - a threshold reference (8), to define a reference threshold;
    - a comparator (9), for comparing said counter value with said reference threshold and for providing an output warning signal according to the result of said comparator (9)
    characterized by the fact that said counter (7) is connected to said ponder over (6) for updating said counter value by adding or substracting said ponder value depending on a sequence of execution of said input command.
  11. A cryptographic token or IC card (1) according to claim 10, characterized by the fact that said output warning signal is applied to said microcontroller (2) to delay next cryptographic calculation operations thus confusing an attacker with wrong output value.
  12. A cryptographic token or IC card (1) according to claim 10, characterized by the fact that said counter value is stored in a non volatile memory portion associated to said microcontroller (2).
  13. A cryptographic token or IC card (1) according to claim 10, characterized by the fact that said counter (9) is initialized with a suitable starting value obtained by experimental results on a typical working scenario of the cryptographic token or IC Card (1).
  14. A cryptographic token or IC card (1) according to claim 10, characterized by the fact that said ponder over (6) is a look up table.
  15. A cryptographic token or IC card (1) according to claim 14, characterized by the fact that values of said look up table are updated dynamically after a processing of an input command.
EP05763311A 2004-06-30 2005-06-30 Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card Not-in-force EP1665001B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP05763311A EP1665001B1 (en) 2004-06-30 2005-06-30 Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP04425482A EP1612639A1 (en) 2004-06-30 2004-06-30 Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card
EP05763311A EP1665001B1 (en) 2004-06-30 2005-06-30 Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card
PCT/EP2005/007065 WO2006002926A2 (en) 2004-06-30 2005-06-30 Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card

Publications (2)

Publication Number Publication Date
EP1665001A2 EP1665001A2 (en) 2006-06-07
EP1665001B1 true EP1665001B1 (en) 2008-03-19

Family

ID=34932600

Family Applications (2)

Application Number Title Priority Date Filing Date
EP04425482A Withdrawn EP1612639A1 (en) 2004-06-30 2004-06-30 Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card
EP05763311A Not-in-force EP1665001B1 (en) 2004-06-30 2005-06-30 Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card

Family Applications Before (1)

Application Number Title Priority Date Filing Date
EP04425482A Withdrawn EP1612639A1 (en) 2004-06-30 2004-06-30 Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card

Country Status (7)

Country Link
US (1) US8566927B2 (en)
EP (2) EP1612639A1 (en)
CN (1) CN100535822C (en)
AT (1) ATE389917T1 (en)
BR (1) BRPI0512912A (en)
DE (1) DE602005005422T2 (en)
WO (1) WO2006002926A2 (en)

Families Citing this family (117)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8261058B2 (en) 2005-03-16 2012-09-04 Dt Labs, Llc System, method and apparatus for electronically protecting data and digital content
FR2893436B1 (en) * 2005-11-15 2008-02-15 Oberthur Card Syst Sa SECURING BETWEEN ELECTRONIC COMPONENTS OF A PORTABLE SECURE ELECTRONIC ENTITY
US8566695B2 (en) 2007-03-30 2013-10-22 Sandisk Technologies Inc. Controlling access to digital content
US9010630B2 (en) 2007-12-24 2015-04-21 Dynamics Inc. Systems and methods for programmable payment cards and devices with loyalty-based payment applications
FR2925968B1 (en) * 2007-12-26 2011-06-03 Ingenico Sa MICROPROCESSOR SECURING METHOD, COMPUTER PROGRAM AND CORRESPONDING DEVICE
FR2935817B1 (en) * 2008-09-11 2011-12-09 Oberthur Technologies DATA PROCESSING METHOD AND ASSOCIATED DEVICE.
US8579203B1 (en) 2008-12-19 2013-11-12 Dynamics Inc. Electronic magnetic recorded media emulators in magnetic card devices
US8931703B1 (en) 2009-03-16 2015-01-13 Dynamics Inc. Payment cards and devices for displaying barcodes
US8590796B1 (en) 2009-04-06 2013-11-26 Dynamics Inc. Cards having dynamic magnetic stripe communication devices fabricated from multiple boards
US9329619B1 (en) 2009-04-06 2016-05-03 Dynamics Inc. Cards with power management
US8622309B1 (en) 2009-04-06 2014-01-07 Dynamics Inc. Payment cards and devices with budgets, parental controls, and virtual accounts
US8393545B1 (en) 2009-06-23 2013-03-12 Dynamics Inc. Cards deployed with inactivated products for activation
FR2947361B1 (en) * 2009-06-29 2011-08-26 Viaccess Sa METHOD FOR DETECTING ATTACK ATTEMPT, RECORDING MEDIUM AND SECURITY PROCESSOR FOR SAID METHOD
US8511574B1 (en) 2009-08-17 2013-08-20 Dynamics Inc. Advanced loyalty applications for powered cards and devices
US9306666B1 (en) 2009-10-08 2016-04-05 Dynamics Inc. Programming protocols for powered cards and devices
US8727219B1 (en) 2009-10-12 2014-05-20 Dynamics Inc. Magnetic stripe track signal having multiple communications channels
US8523059B1 (en) 2009-10-20 2013-09-03 Dynamics Inc. Advanced payment options for powered cards and devices
US8393546B1 (en) 2009-10-25 2013-03-12 Dynamics Inc. Games, prizes, and entertainment for powered cards and devices
JP5866302B2 (en) 2010-02-16 2016-02-17 ダイナミックス インコーポレイテッド System and method for drive circuit of dynamic magnetic stripe communication device
US8348172B1 (en) 2010-03-02 2013-01-08 Dynamics Inc. Systems and methods for detection mechanisms for magnetic cards and devices
US10693263B1 (en) 2010-03-16 2020-06-23 Dynamics Inc. Systems and methods for audio connectors for powered cards and devices
AU2011255568A1 (en) 2010-05-18 2012-12-06 Dynamics Inc. Systems and methods for cards and devices operable to communicate via light pulses and touch sensitive displays
USD674013S1 (en) 2010-07-02 2013-01-08 Dynamics Inc. Multiple button interactive electronic card with light sources
USD652449S1 (en) 2010-07-02 2012-01-17 Dynamics Inc. Multiple button interactive electronic card
USD652448S1 (en) 2010-07-02 2012-01-17 Dynamics Inc. Multiple button interactive electronic card
USD670759S1 (en) 2010-07-02 2012-11-13 Dynamics Inc. Multiple button interactive electronic card with light sources
USD652867S1 (en) 2010-07-02 2012-01-24 Dynamics Inc. Multiple button interactive electronic card
USD672389S1 (en) 2010-07-02 2012-12-11 Dynamics Inc. Multiple button interactive electronic card with light sources
USD687094S1 (en) 2010-07-02 2013-07-30 Dynamics Inc. Multiple button interactive electronic card with light sources
USD652075S1 (en) 2010-07-02 2012-01-10 Dynamics Inc. Multiple button interactive electronic card
USD792511S1 (en) 2010-07-09 2017-07-18 Dynamics Inc. Display with font
USD653288S1 (en) 2010-07-09 2012-01-31 Dynamics Inc. Multiple button interactive electronic card
USD652076S1 (en) 2010-07-09 2012-01-10 Dynamics Inc. Multiple button interactive electronic card with display
USD665447S1 (en) 2010-07-09 2012-08-14 Dynamics Inc. Multiple button interactive electronic card with light source and display
USD651237S1 (en) 2010-07-09 2011-12-27 Dynamics Inc. Interactive electronic card with display
USD651644S1 (en) 2010-07-09 2012-01-03 Dynamics Inc. Interactive electronic card with display
USD651238S1 (en) 2010-07-09 2011-12-27 Dynamics Inc. Interactive electronic card with display
USD652450S1 (en) 2010-07-09 2012-01-17 Dynamics Inc. Multiple button interactive electronic card
USD665022S1 (en) 2010-07-09 2012-08-07 Dynamics Inc. Multiple button interactive electronic card with light source
USD666241S1 (en) 2010-07-09 2012-08-28 Dynamics Inc. Multiple button interactive electronic card with light source
USD643063S1 (en) 2010-07-09 2011-08-09 Dynamics Inc. Interactive electronic card with display
USD792512S1 (en) 2010-07-09 2017-07-18 Dynamics Inc. Display with font
USD792513S1 (en) 2010-07-09 2017-07-18 Dynamics Inc. Display with font
US8322623B1 (en) 2010-07-26 2012-12-04 Dynamics Inc. Systems and methods for advanced card printing
US9818125B2 (en) 2011-02-16 2017-11-14 Dynamics Inc. Systems and methods for information exchange mechanisms for powered cards and devices
US10055614B1 (en) 2010-08-12 2018-08-21 Dynamics Inc. Systems and methods for advanced detection mechanisms for magnetic cards and devices
US9053398B1 (en) 2010-08-12 2015-06-09 Dynamics Inc. Passive detection mechanisms for magnetic cards and devices
US10022884B1 (en) 2010-10-15 2018-07-17 Dynamics Inc. Systems and methods for alignment techniques for magnetic cards and devices
US8561894B1 (en) 2010-10-20 2013-10-22 Dynamics Inc. Powered cards and devices designed, programmed, and deployed from a kiosk
US9646240B1 (en) 2010-11-05 2017-05-09 Dynamics Inc. Locking features for powered cards and devices
DE102010054446A1 (en) * 2010-12-14 2012-06-14 Giesecke & Devrient Gmbh Portable data carrier with misoperation counter
US8567679B1 (en) 2011-01-23 2013-10-29 Dynamics Inc. Cards and devices with embedded holograms
US10095970B1 (en) 2011-01-31 2018-10-09 Dynamics Inc. Cards including anti-skimming devices
US9836680B1 (en) 2011-03-03 2017-12-05 Dynamics Inc. Systems and methods for advanced communication mechanisms for magnetic cards and devices
JP5776927B2 (en) * 2011-03-28 2015-09-09 ソニー株式会社 Information processing apparatus and method, and program
US8485446B1 (en) 2011-03-28 2013-07-16 Dynamics Inc. Shielded magnetic stripe for magnetic cards and devices
WO2012154915A1 (en) 2011-05-10 2012-11-15 Dynamics Inc. Systems, devices, and methods for mobile payment acceptance, mobile authorizations, mobile wallets, and contactless communication mechanisms
USD670329S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive display card
USD670330S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive card
USD670332S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive card
USD670331S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive display card
USD676904S1 (en) 2011-05-12 2013-02-26 Dynamics Inc. Interactive display card
US8628022B1 (en) 2011-05-23 2014-01-14 Dynamics Inc. Systems and methods for sensor mechanisms for magnetic cards and devices
US8827153B1 (en) 2011-07-18 2014-09-09 Dynamics Inc. Systems and methods for waveform generation for dynamic magnetic stripe communications devices
US9654467B1 (en) * 2013-03-14 2017-05-16 EMC IP Holding Company LLC Time synchronization solutions for forward-secure one-time authentication tokens
US11551046B1 (en) 2011-10-19 2023-01-10 Dynamics Inc. Stacked dynamic magnetic stripe commmunications device for magnetic cards and devices
US11409971B1 (en) 2011-10-23 2022-08-09 Dynamics Inc. Programming and test modes for powered cards and devices
US9619741B1 (en) 2011-11-21 2017-04-11 Dynamics Inc. Systems and methods for synchronization mechanisms for magnetic cards and devices
US8960545B1 (en) 2011-11-21 2015-02-24 Dynamics Inc. Data modification for magnetic cards and devices
US9064194B1 (en) 2012-02-03 2015-06-23 Dynamics Inc. Systems and methods for spike suppression for dynamic magnetic stripe communications devices
US9710745B1 (en) 2012-02-09 2017-07-18 Dynamics Inc. Systems and methods for automated assembly of dynamic magnetic stripe communications devices
US8888009B1 (en) 2012-02-14 2014-11-18 Dynamics Inc. Systems and methods for extended stripe mechanisms for magnetic cards and devices
US9916992B2 (en) 2012-02-20 2018-03-13 Dynamics Inc. Systems and methods for flexible components for powered cards and devices
US9734669B1 (en) 2012-04-02 2017-08-15 Dynamics Inc. Cards, devices, systems, and methods for advanced payment game of skill and game of chance functionality
US11961147B1 (en) 2012-04-15 2024-04-16 K. Shane Cupp Cards, devices, systems, and methods for financial management services
US11418483B1 (en) 2012-04-19 2022-08-16 Dynamics Inc. Cards, devices, systems, and methods for zone-based network management
US9033218B1 (en) 2012-05-15 2015-05-19 Dynamics Inc. Cards, devices, systems, methods and dynamic security codes
US9064195B2 (en) 2012-06-29 2015-06-23 Dynamics Inc. Multiple layer card circuit boards
USD729869S1 (en) 2012-08-27 2015-05-19 Dynamics Inc. Interactive electronic card with display and button
USD687887S1 (en) 2012-08-27 2013-08-13 Dynamics Inc. Interactive electronic card with buttons
USD828870S1 (en) 2012-08-27 2018-09-18 Dynamics Inc. Display card
USD687489S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with buttons
USD730438S1 (en) 2012-08-27 2015-05-26 Dynamics Inc. Interactive electronic card with display and button
USD729871S1 (en) 2012-08-27 2015-05-19 Dynamics Inc. Interactive electronic card with display and buttons
USD730439S1 (en) 2012-08-27 2015-05-26 Dynamics Inc. Interactive electronic card with buttons
USD687095S1 (en) 2012-08-27 2013-07-30 Dynamics Inc. Interactive electronic card with buttons
USD687490S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with display and button
USD695636S1 (en) 2012-08-27 2013-12-17 Dynamics Inc. Interactive electronic card with display and buttons
USD729870S1 (en) 2012-08-27 2015-05-19 Dynamics Inc. Interactive electronic card with display and button
USD675256S1 (en) 2012-08-27 2013-01-29 Dynamics Inc. Interactive electronic card with display and button
USD687487S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with display and button
USD676487S1 (en) 2012-08-27 2013-02-19 Dynamics Inc. Interactive electronic card with display and buttons
USD692053S1 (en) 2012-08-27 2013-10-22 Dynamics Inc. Interactive electronic card with display and button
USD688744S1 (en) 2012-08-27 2013-08-27 Dynamics Inc. Interactive electronic card with display and button
USD673606S1 (en) 2012-08-27 2013-01-01 Dynamics Inc. Interactive electronic card with display and buttons
USD694322S1 (en) 2012-08-27 2013-11-26 Dynamics Inc. Interactive electronic card with display buttons
USD687488S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with buttons
US11126997B1 (en) 2012-10-02 2021-09-21 Dynamics Inc. Cards, devices, systems, and methods for a fulfillment system
US9010647B2 (en) 2012-10-29 2015-04-21 Dynamics Inc. Multiple sensor detector systems and detection methods of magnetic cards and devices
US9659246B1 (en) 2012-11-05 2017-05-23 Dynamics Inc. Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices
US9010644B1 (en) 2012-11-30 2015-04-21 Dynamics Inc. Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices
US10949627B2 (en) 2012-12-20 2021-03-16 Dynamics Inc. Systems and methods for non-time smearing detection mechanisms for magnetic cards and devices
USD751640S1 (en) 2013-03-04 2016-03-15 Dynamics Inc. Interactive electronic card with display and button
USD764584S1 (en) 2013-03-04 2016-08-23 Dynamics Inc. Interactive electronic card with buttons
USD750168S1 (en) 2013-03-04 2016-02-23 Dynamics Inc. Interactive electronic card with display and button
USD777252S1 (en) 2013-03-04 2017-01-24 Dynamics Inc. Interactive electronic card with buttons
USD750166S1 (en) 2013-03-04 2016-02-23 Dynamics Inc. Interactive electronic card with display and buttons
USD750167S1 (en) 2013-03-04 2016-02-23 Dynamics Inc. Interactive electronic card with buttons
USD751639S1 (en) 2013-03-04 2016-03-15 Dynamics Inc. Interactive electronic card with display and button
USD765173S1 (en) 2013-03-04 2016-08-30 Dynamics Inc. Interactive electronic card with display and button
USD765174S1 (en) 2013-03-04 2016-08-30 Dynamics Inc. Interactive electronic card with button
USD767024S1 (en) 2013-09-10 2016-09-20 Dynamics Inc. Interactive electronic card with contact connector
USD737373S1 (en) 2013-09-10 2015-08-25 Dynamics Inc. Interactive electronic card with contact connector
US10108891B1 (en) 2014-03-21 2018-10-23 Dynamics Inc. Exchange coupled amorphous ribbons for electronic stripes
US10063569B2 (en) * 2015-03-24 2018-08-28 Intel Corporation Custom protection against side channel attacks
KR102316279B1 (en) * 2015-10-19 2021-10-22 삼성전자주식회사 Non-volatile memory device and solid state drive including the same
US10032049B2 (en) 2016-02-23 2018-07-24 Dynamics Inc. Magnetic cards and devices for motorized readers

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS60207957A (en) * 1984-03-31 1985-10-19 Toshiba Corp Data protecting system
GB2200933B (en) * 1987-02-10 1990-10-03 Forex Neptune Sa Drilling fluid
SE9803569L (en) * 1998-10-19 2000-04-20 Ericsson Telefon Ab L M Authentication procedure and system
FR2786006B1 (en) * 1998-11-17 2001-10-12 Schlumberger Systems & Service DEVICE FOR LIMITING FRAUD IN AN INTEGRATED CIRCUIT CARD
US6496808B1 (en) * 1998-12-22 2002-12-17 At&T Corp. Using smartcards to enable probabilistic transaction on an untrusted device
US6775780B1 (en) * 2000-03-16 2004-08-10 Networks Associates Technology, Inc. Detecting malicious software by analyzing patterns of system calls generated during emulation
CA2326036A1 (en) * 2000-11-16 2002-05-16 Gemplus S.A. Method for securing electronic device data processing
FR2819070B1 (en) * 2000-12-28 2003-03-21 St Microelectronics Sa PROTECTION METHOD AND DEVICE AGAINST HACKING INTEGRATED CIRCUITS
SG120868A1 (en) * 2001-08-28 2006-04-26 Seagate Technology Llc Data storage device security method and apparatus
US8909926B2 (en) * 2002-10-21 2014-12-09 Rockwell Automation Technologies, Inc. System and methodology providing automation security analysis, validation, and learning in an industrial controller environment

Also Published As

Publication number Publication date
CN101031857A (en) 2007-09-05
CN100535822C (en) 2009-09-02
EP1665001A2 (en) 2006-06-07
US8566927B2 (en) 2013-10-22
ATE389917T1 (en) 2008-04-15
WO2006002926A2 (en) 2006-01-12
EP1612639A1 (en) 2006-01-04
DE602005005422D1 (en) 2008-04-30
BRPI0512912A (en) 2008-04-15
WO2006002926A3 (en) 2006-03-16
US20080209550A1 (en) 2008-08-28
DE602005005422T2 (en) 2009-04-23

Similar Documents

Publication Publication Date Title
EP1665001B1 (en) Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card
US8528108B2 (en) Protecting secret information in a programmed electronic device
US6952778B1 (en) Protecting access to microcontroller memory blocks
EP1455499B1 (en) Security element commanding method and mobile terminal
EP1857943A1 (en) Computer system having memory protection function
WO2006024904A1 (en) Data access security implementation using the public key mechanism
US7516902B2 (en) Protection of a microcontroller
US8375253B2 (en) Detection of a fault by long disturbance
WO2006024903A1 (en) Application code integrity check during virtual machine runtime
US9262631B2 (en) Embedded device and control method thereof
WO2011080272A1 (en) Jcvm bytecode execution protection against fault attacks
US7412608B2 (en) Secure data processing unit, and an associated method
CN107273150B (en) Preloading firmware downloading and writing method and device
US7353403B2 (en) Computer systems such as smart cards having memory architectures that can protect security information, and methods of using same
EP1194845B1 (en) Device for processing data and corresponding method
EP1739587A1 (en) Portable electronic apparatus and secured data output method therefor
JP2006155159A (en) Tamper-proof device
WO2001097010A2 (en) Data processing method and device for protected execution of instructions
EP1739519A1 (en) Method to secure the execution of a program against attacks by radiation or other
Toll et al. The Caernarvon secure embedded operating system
CN113127940A (en) Method and device for protecting smart card against side channel attack
US7806319B2 (en) System and method for protection of data contained in an integrated circuit
CN100395771C (en) Microcircuit card whereof the performances can be modified after customization
US20040268313A1 (en) Statistical control of the integrity of a program
US20100042851A1 (en) Method for Securely Handling Data During the Running of Cryptographic Algorithms on Embedded Systems

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20060228

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR LV MK YU

17Q First examination report despatched

Effective date: 20060710

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: INCARD SA

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

DAX Request for extension of the european patent (deleted)
RIC1 Information provided on ipc code assigned before grant

Ipc: G06F 21/00 20060101AFI20070913BHEP

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REF Corresponds to:

Ref document number: 602005005422

Country of ref document: DE

Date of ref document: 20080430

Kind code of ref document: P

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080319

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080319

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080319

NLV1 Nl: lapsed or annulled due to failure to fulfill the requirements of art. 29p and 29m of the patents act
PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080319

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080319

Ref country code: BE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080319

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080826

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080319

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080319

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080630

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080619

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080319

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080319

ET Fr: translation filed
PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080719

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080319

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080630

26N No opposition filed

Effective date: 20081222

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080630

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080319

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080619

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080319

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20090630

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20090630

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080920

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080630

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080319

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20080620

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20130527

Year of fee payment: 9

REG Reference to a national code

Ref country code: DE

Ref legal event code: R082

Ref document number: 602005005422

Country of ref document: DE

Representative=s name: KLUNKER, SCHMITT-NILSON, HIRSCH, DE

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20130523

Year of fee payment: 9

REG Reference to a national code

Ref country code: DE

Ref legal event code: R082

Ref document number: 602005005422

Country of ref document: DE

Representative=s name: SCHMITT-NILSON SCHRAUD WAIBEL WOHLFROM PATENTA, DE

Effective date: 20130813

Ref country code: DE

Ref legal event code: R082

Ref document number: 602005005422

Country of ref document: DE

Representative=s name: KLUNKER, SCHMITT-NILSON, HIRSCH, DE

Effective date: 20130813

Ref country code: DE

Ref legal event code: R081

Ref document number: 602005005422

Country of ref document: DE

Owner name: STMICROELECTRONICS INTERNATIONAL N.V., CH

Free format text: FORMER OWNER: INCARD S.A., GENEVA, CH

Effective date: 20130813

REG Reference to a national code

Ref country code: FR

Ref legal event code: TP

Owner name: STMICROELECTRONICS INTERNATIONAL N.V., NL

Effective date: 20140203

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20140630

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20140630

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 11

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20140630

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 12

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 13

REG Reference to a national code

Ref country code: DE

Ref legal event code: R082

Ref document number: 602005005422

Country of ref document: DE

Representative=s name: SCHMITT-NILSON SCHRAUD WAIBEL WOHLFROM PATENTA, DE

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 14

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20200519

Year of fee payment: 16

Ref country code: FR

Payment date: 20200520

Year of fee payment: 16

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 602005005422

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220101

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210630